With IP-enabled systems beginning to mature at an alarmingly fast pace, the options open to security managers in medium-sized end user organisations are undergoing a revolution. The newest set-ups, it seems, are based around 3G system architectures borrowed from the IT sector.

Designing and then deploying an integrated security system for mid-size client organisations can be like trying to fit a square peg into a round hole. Traditional integrated security systems, you see, were either designed for smaller, single-building installations or larger, multi-location corporate campuses. Those same systems were also either hard-wired, single facility systems or high end, expensive client server-based configurations.

However, the increasing maturation of IP-based security solutions is now revolutionising the options open to mid-size companies who may be looking to install and scale security systems as business expansion and acquisitions dictate (but will at the same time be seeking to contain operational costs). These new systems are based entirely on 3G – Third Generation – system architectures borrowed from the IT world.

The paradigm shift in security offerings realised by IP-based security systems is made possible by incorporating three key elements into the design of products: application scaleability, geographic independence and web-based architecture. Together, these elements address the costs needed to install, administer and maintain an integrated system.

Simply put, application scaleability refers to the integration of a broad mix of security management applications into a single system. Common applications would include video, visitor management, access control, alarm monitoring, intercom and internal space temperature monitoring. Applications may be added at any time to meet a specific site need.

Graphic independence explained

Graphic independence is the ability to expand the product from a single system into a global network of systems regardless of where the components are located. This is particularly important for those businesses looking to grow by acquisition, or those that may be expanding their offices in remote locations. A critical feature for the security managers of such companies is the requirement to procure a system that allows the management of a mixed card population (thus avoiding the need to re-issue access credentials).

The third element of the product design is a web-based architecture. This allows a given application to make use of a common web browser in delivering an easily understood and ‘rich’ user interface. In turn, this means that not only are systems easier to learn (because they behave just like common Internet web sites), but also that their use often doesn’t require the installation of special software. The web browser is already there.

Some of the newer systems take these elements one step further by providing a solid-state implementation. In other words, they have no moving parts and therefore their mean time between failures (MTBF) is far in excess of those systems requiring traditional PC servers.

Network-based solid-state systems that require more memory than would conveniently fit can use network-attached storage. End users will be interested to learn that this is now available at very reasonable prices.

Scaleability and complexity

As expected, when a business grows and the sheer scale of a security system increases, the price and size of that system will also burgeon. These new 3G systems allow mid-sized businesses to expand their integrated security platform at their own pace without having to ‘over buy’ up front to enable future expansion.

In the scaleability and complexity matrix (see figure 1 on page 41) it is immediately apparent that there are many security systems available to meet the differing levels of complexity and scaleability. However, two significant problems are evident when looking at today’s offerings.

The paradigm shift in security offerings thanks to today’s Internet Protocol-based security systems is made possible by incorporating three key elements into the design of products: application scaleability, geographic independence and web-based architecture

First, as a medium-sized company grows and moves up either axis – or, indeed, both axes – on the graph, it is forced into switching security systems. Second, in many cases there is no simple solution available to meet the company’s specific mix of scale and complexity. For instance, if a company grows by adding a number of small sales offices, it would have to buy a high-end system in order to acquire the features to integrate these individually simple, small sites under one access control management system. Today’s evolved 3G systems use communication over the Internet to drive down the cost of integrating multiple sites.

Mid-sized companies will recognise the largest set of benefits of 3G IP-based systems. Mid-sized businesses differ greatly, though most tend to have annual revenues of upwards of £11 million and employ between 100 and 1,000 staff. Such businesses tend to go through the most changes as a result of growth and divestitures. Let’s think about that for a moment... The security needs of a 100-person business and a 500-person business are very different. In view of their inherent differences, these types of businesses have the greatest need for the flexibility and scaleability that’s inherent in IP-based systems.

Commonalities between companies

While statistically diverse, mid-sized companies have some common security needs that are driving today’s security market. First and foremost, such companies need to incorporate disparate facilities and sites into the enterprise security structure. Many of them maintain small, dispersed facilities that do not have integrated security protection, and are thus lacking the convenience and cost advantages of an integrated security system.

Such companies are also looking to extend the enterprise security ‘umbrella’ to include these locations, and thus help in the management of liability and threat levels while facilitating audit and control. That said, the economics of small, integrated systems prevent their installation in multiple facilities.

A second market driver is greater management control over security. A substantial number of mid-sized companies are using smaller systems, but require integration systems that exceed those provided by low to mid-priced security products. Alongside this desire for increased control is the need to integrate new technologies – including Voice-over-IP – into the physical security function.

Mid-sized companies are increasing IT spending at a rapid pace. However, for the most part they are not actually increasing the ranks of their IT or security staff. Instead, they’re looking for solutions that tightly integrate IT functions and that capitalise on their existing IT infrastructures with a view to keeping operating costs at a minimum.

The third market driver is, of course, cost. Many mid-sized companies have very specific high-end security requirements, but lack the budgets to implement top-shelf systems with their high installation and ongoing financial requirements. These companies are looking for systems that can reduce installation, maintenance and operational costs. IP-based systems offer lower total cost of ownership by sharing resources with IT (yet integrating existing physical infrastructure such as readers and monitoring points).

From product to solution

The combination of market drivers and the new technologies these emerging 3G systems require is gradually transforming the security spend from a product purchase to an end user solution purchase. The following are a few of the key questions that medium-sized company security managers should ask when selecting a 3G security solution for their site(s)...

  • does the vendor’s applications Roadmap align with your own long-term goals?
  • is the integration of applications built into a product or pieced together from acquisitions?
  • can the dealer/integrator work with security, operations and IT in order to understand IT needs and installation requirements?
  • does the system provide security and authentication technology to safely connect remote sites over public Internet connections without requiring additional IT equipment?
  • does the vendor’s product support the standards your IT department will require (TCP/IP, XML, ODBC, etc)?
  • do monitoring workstations only require a standard web browser (ie no application client software installation)?
  • is the security system hardware solid-state with no moving parts which lower the MTBF?

The interaction of the security solution with existing and planned IT infrastructures is an increasingly important criterion that must be considered when purchasing a new set-up. It is absolutely critical that security plans are aligned with IT expansion. One of the simplest ways to ensure that the solution will interact smoothly with IT systems is to select a vendor boasting a history in both physical security and IT development. This IT integration requires close consideration of both vendors and product attributes so as to ensure the solution will fit into a company’s long-term IT planning.

The Way Forward: NetBox 3G solutions for end users

The NetBox is believed to be the first physical security management system to integrate access control, alarm monitoring, video, intercom and temperature monitoring applications in a small-form factor network appliance, writes Brian Sims. It uses an all-new systems architecture that moves advanced physical security capabilities to the network edge, eliminating the need for a separate PC-based server. This architecture makes it possible to deploy systems that scale from single facilities through to multi-site organisations – all over an Internet Protocol-enabled network.

Unlike certain other integrated systems, the NetBox uses existing LAN, WAN and Internet connectivity in place of proprietary wiring. End users interact with the NetBox through a web browser, making it unnecessary to install or maintain software on any PC server or client. A feature dubbed ‘zero footprint software install’.

In practice, the network connectivity and browser-based user interface of NetBox renders the system completely independent of geography, enabling end users and systems integrators to perform monitoring, control and maintenance from any computer at any location with a network connection. As the browser interface looks and operates like a web site, users can become proficient with little training. And, of course, as it was designed from the ground up as a network appliance, it incorporates all of the data security techniques (such as Secure Socket Layer and SHA-1 Mac encoding) required to make it a ‘secure network citizen’.